Prototype pollution in Kibana leads to arbitrary code...
Critical severity
Unreviewed
Published
Mar 5, 2025
to the GitHub Advisory Database
•
Updated Apr 2, 2025
Description
Published by the National Vulnerability Database
Mar 5, 2025
Published to the GitHub Advisory Database
Mar 5, 2025
Last updated
Apr 2, 2025
Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests.
In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role. In Kibana versions 8.17.1 and 8.17.2 , this is only exploitable by users that have roles that contain all the following privileges: fleet-all, integrations-all, actions:execute-advanced-connectors
References